Synopses & Reviews
Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors-our defenses must be ready all the time and our alert systems must detect the threats every time.
- Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
- Dives deeply into relevant technical and factual information from an insider's point of view
- Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
Review
"Regardless of where the definition of cyber warfare finally settles, be it simply a war waged over the Internet, a technological cold war, network-based hostilities or simply another theater of war, there are without doubt activities that transpire over the wire that require much closer scrutiny not only by the security community but also by governments, businesses and the general public. The authors accurately and adeptly take the reader from the headlines to the front lines with frequent stops in underground communities, legislative halls and anywhere hackers (ethical or otherwise) are in high demand. This book serves as a report on the current cyber state of affairs on a global scale, as a career guide to those looking to enter this burgeoning field, and, most importantly, as a reference on protecting assets that are unmistakably in the field of battle...whether intended or not."--
Donald C. Donzal, Editor-In-Chief, The Ethical Hacker Network "A fifth domain of war has been added to land, air, sea and space: cyber. Malware capable of taking a nuclear program offline was science fiction 5 years ago: Stuxnet demonstrates that information security is now a matter of national security. This timely and necessary book provides an assessment of the current state of cyber warfare, and more importantly, where the conflict is heading. Highly recommended for information security professionals."--Eric Conrad, Lead Author, CISSP Study Guide, President, Backshore Communications
Synopsis
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners discusses the strategic, operational, and tactical aspects of cyber warfare. The book provides information that organizations can use to develop a strategic vision for cyber security, but it is also designed to spur national debate on the direction of cyber warfare.
Starting with a definition of cyber warfare, the book's 15 chapters discuss the following topics: the cyberspace battlefield; cyber doctrine; cyber warriors; logical, physical, and psychological weapons; computer network exploitation; computer network attack and defense; non-state actors in computer network operations; legal system impacts; ethics in cyber warfare; cyberspace challenges; and the future of cyber war.
This book is a valuable resource to those involved in cyber warfare activities, including policymakers, penetration testers, security professionals, network and systems administrators, and college instructors. The information provided on cyber tactics and attacks can also be used to assist in developing improved and more efficient procedures and technical defenses. Managers will find the text useful in improving the overall risk management strategies for their organizations.
- Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
- Dives deeply into relevant technical and factual information from an insider's point of view
- Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
Synopsis
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The concepts discussed will give students of information security a better idea of how cyber conflicts are carried out now, how they will change in the future, and how to detect and defend against espionage, hacktivism, insider threats and non-state actors such as organized criminals and terrorists.
Every one of our systems is under attack from multiple vectors - our defenses must be ready all the time and our alert systems must detect the threats every time. This book provides concrete examples and real-world guidance on how to identify and defend a network against malicious attacks. It considers relevant technical and factual information from an insider's point of view, as well as the ethics, laws and consequences of cyber war and how computer criminal law may change as a result. Starting with a definition of cyber warfare, the book's 15 chapters discuss the following topics: the cyberspace battlefield; cyber doctrine; cyber warriors; logical, physical, and psychological weapons; computer network exploitation; computer network attack and defense; non-state actors in computer network operations; legal system impacts; ethics in cyber warfare; cyberspace challenges; and the future of cyber war.
This book is a valuable resource to those involved in cyber warfare activities, including policymakers, penetration testers, security professionals, network and systems administrators, and college instructors. The information provided on cyber tactics and attacks can also be used to assist in developing improved and more efficient procedures and technical defenses. Managers will find the text useful in improving the overall risk management strategies for their organizations.
- Provides concrete examples and real-world guidance on how to identify and defend your network against malicious attacks
- Dives deeply into relevant technical and factual information from an insider's point of view
- Details the ethics, laws and consequences of cyber war and how computer criminal law may change as a result
Synopsis
Cyber Warfare provides a comprehensive look at how and why digital warfare is waged!
Synopsis
Cyber Warfare explores the battlefields, participants and the tools and techniques used during today's digital conflicts. The concepts discussed in this book will give those involved in information security at all levels a better idea of how cyber conflicts are carried out now, how they will change in the future and how to detect and defend against espionage, hacktivism, insider threats and non-state actors like organized criminals and terrorists. Every one of our systems is under attack from multiple vectors—our defenses must be ready all the time and our alert systems must detect the threats every time.
About the Author
Jason Andress (ISSAP, CISSP, GPEN, CEH) is a seasoned security professional with a depth of experience in both the academic and business worlds. He is presently employed by a major software company, providing global information security oversight, and performing penetration testing, risk assessment, and compliance functions to ensure that the company's assets are protected. Jason has taught undergraduate and graduate security courses since 2005 and holds a Doctorate in Computer Science, researching in the area of data protection. He has authored several publications and books, writing on topics including data security, network security, penetration testing, and digital forensics.Steve Winterfeld has a strong technical and leadership background in Cyber Security, System Certificating and Accreditation, Training, Military Intelligence, Simulations, and Project Management. He served a 22 year career in the U.S. Army, including Airborne Ranger Infantry Platoon Leader, Military Intelligence Electric Warfare Company Commander, Signal Battalion XO, Command and General Staff instructor and finished by building the NOC / CERT for U.S. Army SOUTHCOM. Steve currently work for TASC where he lead the first Global Hawk Unmanned Aerial Vehicle certification and accreditation, designed the security for the lab network and is currently the lead CyberWarrior instructor, Vulnerability Assessment and Penetration Test team manager, and Tech Dir. for 127 million unit. He holds the CISSP, PMP, SANS GSEC, and Six Sigma certifications and has an MS in Computer Information Systems.
CISSP, PMP, SANS GSEC, and Six Sigma, and hold TS/SCI clearance
Table of Contents
Foreword Introduction Chapter 1:
What is Cyber Warfare? Chapter 2:
The Cyberspace Battlefield Chapter 3:
Cyber Doctrine Chapter 4:
Cyber Warriors Chapter 5:
Logical Weapons Chapter 6:
Physical Weapons Chapter 7:
Psychological Weapons Chapter 8:
Computer Network Exploitation Chapter 9:
Computer Network Attack Chapter 10:
Computer Network Defense Chapter 11:
Non-State Actors in Computer Network Operations Chapter 12:
Legal System Impacts Chapter 13:
Ethics Chapter 14:
Cyberspace Challenges Chapter 15:
The Future of Cyber War Appendix:
Cyber Timeline